Rules

Rules are used to group rules together under a common condition.

For example, you may want to create a set of rules that only apply to a specific user. To do this you create a new User rule for James and create the rules that you want to apply just for him under executable control, privilege management and browser control. When an event occurs on an endpoint e.g. a user launches an application, the condition on the group is checked; in this case the condition is ‘is the currently logged in user on the endpoint james?’. If this is true then all the rules under the James rule set will be considered, if not then they are ignored for this event.

Note also that certain rules will apply only to certain events, those that don’t apply will just be ignored. For the event when a user launches an application the browser control rules would be ignored. For an event where a user navigates to a new web page the executable control and privilege management rules would be ignored.

In this section:

Manage Rules

Rule nodes allow you to create rules targeting specific users, groups, and devices, and assign security level policies, resource access, and resource restrictions that apply to the users, groups, and devices that match the rules. There are six rule types:

Rule nodes provide Security Level settings for specifying the levels of restrictions to execute files. Application Control configuration rule settings security levels specify how to manage requests to run unauthorized applications by the users, groups, or devices that a rule matches:

  • Restricted - Only authorized applications can run. These include files owned by members of the Trusted Owners list and files listed in Allowed Items, Trusted Vendors, and Trusted Applications.
  • Self-Authorizing - Users are prompted for decisions about blocking or running unauthorized files on the host device.
  • Audit only - All actions are permitted but events are logged and audited, for monitoring purposes.
  • Unrestricted - All actions are permitted without event logging or auditing settings for specifying the levels of restrictions to execute files.

Rule nodes also provide a further layer of granularity for controlling application use with Allowed Items, Denied Items and Trusted Vendors for specifying lists of files, folders, drives and signature items, network connection items, Windows store apps, and groups that are allowed or prevented from running.

To display all rules in the configuration, click Rules in the navigation tree. A summary displays all rules listed under the relevant rule type. The security level assigned to each rule is seen and can also be amended.

Security Levels

Apply security levels to control whether the user, group, and devices specified in a rule are fully restricted by Application Control rules, unrestricted, audited only, or granted self-authorization status entitling the user to decide whether to run an application. Self-authorized users can be audited by raising events in the Auditing component and the Windows Event Log.

Set the Security Level

To set the Security Level, select the required node and, using the slider, apply the required security level.

Restricted

Select to restrict users, groups, and devices in the rule to run only authorized applications. These include files owned by members of the Trusted Owners list and files listed in the Allowed Items node.

This setting blocks use of unauthorized applications. It is the recommended setting only after a n adequate period of auditing has enabled the identification or regularly used applications.

Self-Authorize

Select to prompt users, groups, and devices in the rule to decide whether to allow execute requests for each unauthorized file. Unauthorized files either do not belong to the Trusted Owners list or are not specified in the Allowed Items list of a given rule.

A self-authorizing user prompt includes the following options:

  • Allow - Allows the application to run.
  • Block - Blocks the application from running.

When a DLL file is allowed to run, a message notifies the user that the application which uses the DLL may need to be restarted. The default message which displays can be modified in the Message Settings dialog on the Global Settings ribbon.

Any untrusted dlls are automatically allowed for executables that have been self authorized.

Users can also decide how long the setting is applied for:

  • Remember my decision for this session only - The authorization decision is upheld only for the current session. The user is prompted again for an authorization decision when attempting to run an application in any future sessions.
  • Remember my decisions permanently - The user decision is upheld for all future sessions.

If neither of these options are selected, the decision is upheld only for the current instance the user is attempting to run. The self-authorization prompt is reissued for any future attempts to run instances of the application.

Audit Only

Select to log and audit events for monitoring purposes. This setting permits all actions according to policy settings defined in Auditing.

Typically, this setting is used when first setting up Application Control for use. A period of auditing enables the passive recording of event logs which can then be analyzed and rules developed for what applications should and should not be restricted.

Unrestricted

Select to permit all actions without even logging or auditing.

Policy Change Request Options

Configure which request types and features are available to users for each rule. Policy Change Request settings are available for all rule types, apart from Process rules.

  1. Select a rule in the navigation pane.
  2. Select the Policy Change Requests tab.
  3. Select how Policy Change Requests can be made:
    • Email
    • Telephone (Immediate Policy Change)
  4. Select the methods by which users can initiate Policy Change Requests:
    • Access Denied message box - Users click a link in the message box that displays when a user attempts to access a prohibited application.
    • Application context menu - Users select an option from the context menu of prohibited applications.
    • Desktop icon - Users use a desktop shortcut icon to raise change requests from the Policy Request dialog.

The detail for each setting is configured using the Policy Change Requests dialog, accessed from the Global Settings ribbon.

Related topics